CN106575344A - Displaying private information on personal devices - Google Patents

Displaying private information on personal devices Download PDF

Info

Publication number
CN106575344A
CN106575344A CN201580044639.2A CN201580044639A CN106575344A CN 106575344 A CN106575344 A CN 106575344A CN 201580044639 A CN201580044639 A CN 201580044639A CN 106575344 A CN106575344 A CN 106575344A
Authority
CN
China
Prior art keywords
computing device
incoming communication
user
personal information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201580044639.2A
Other languages
Chinese (zh)
Inventor
亚历山大·法贝格
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google LLC
Original Assignee
Google LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Google LLC filed Critical Google LLC
Publication of CN106575344A publication Critical patent/CN106575344A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/222Monitoring or handling of messages using geographical location information, e.g. messages transmitted or received in proximity of a certain spot or area
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • H04W4/21Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A computing device is described that includes one or more processors and at least one module operable by the one or more processors to determine whether the computing device is currently designated to display private information, receive an incoming communication, responsive to determining that the incoming communication includes private information, determine whether one or more individuals other than a user to whom the incoming communication is directed are proximate to the first computing device, and, responsive to determining that one or more individuals other than the user to whom the incoming communication is directed are proximate to the first computing device, determine, based on a type of the first computing device, whether to display private information. The at least one module is further operable by the one or more processors to, responsive to determining to display the private information, output, for display, an indication of the incoming communication.

Description

Personal information is shown on personal device
Background technology
Mobile computing device allows user to perform several functions, including various forms of communications and calculating.For example, mobile meter Calculation equipment can have the ability to access the Internet, perform game application, plays media, receives message and provide legacy cellular electricity The function of words.
In some instances, user can dress mobile computing device (" wearable device ").However, except wearing movement People outside the user of computing device may can check the information shown by such wearable device --- including private letter Breath.
The content of the invention
In one example, a kind of method includes:Incoming communication is received by computing device, it is described incoming logical in response to determining Letter includes personal information, it is determined that whether one or more individualities different from the user pointed by the incoming communication are close described Computing device, and in response to determining the one or more of individualities different from the user pointed by the incoming communication Be close to the computing device, by the computing device based on the type of the computing device come determine whether show personal information. The method can also include:The personal information is shown in response to determining, the incoming communication is exported by the computing device Indicate for showing, and the personal information is not shown in response to determining, forbid exporting described incoming by the computing device The instruction of communication is for display.
In another example, computing device includes one or more processor and at least one module, and this at least one Module can by one or more processor operate with:In response to determine it is incoming communication include personal information, it is determined that with it is described Whether one or more different individualities of user pointed by incoming communication are close to first computing device, and in response to true The fixed one or more of individualities different from the user pointed by the incoming communication are close to the computing device, are based on The type of first computing device come determine whether show personal information.At least one module can further by this Or the operation of multiple processors with:The personal information is shown in response to determining, the instruction of the incoming communication is exported for aobvious Show, and, in response to determining that first computing device is currently not designated as showing personal information:It is determined that with user's phase Association the second computing device be currently designated as show personal information, and by the instruction of the incoming communication provide to Second computing device.
In additional example, a kind of computer-readable recording medium includes instruction, and the instruction will calculate system when executed One or more processor of system is configured to:In response to determining that incoming communication includes personal information, it is determined that incoming logical with described Whether one or more different individualities of the pointed user of letter are close to the computing device, and in response to determining and the biography Enter the different one or more of individualities of the pointed user of communication and be close to the computing device, set based on the calculating Standby type come determine whether show personal information.Instruction when executed further by computing system one or more at Reason device is configured to:The personal information is shown in response to determining, the instruction of the incoming communication is exported for showing, and response In it is determined that do not show personal information, forbidding exporting the instruction of incoming communication for showing.
The details of one or more example of the disclosure is elaborated in the the accompanying drawings and the following description.Further feature, mesh , and advantage will become clear from according to the specification and drawings and according to claims.
Description of the drawings
Fig. 1 be a diagram that one or more technologies, display for managing personal information the examples according to the disclosure The block diagram of system.
Fig. 2 be a diagram that according to the disclosure it is one or more technologies, determine whether personal information to be exported to calculating The block diagram of the exemplary computing system of equipment.
Fig. 3 be a diagram that the mobile meters one or more technologies, determining whether display personal information according to the disclosure The block diagram of calculation equipment.
Fig. 4 is a diagram that according to the one or more technologies of the disclosure, output information for showing at remote equipment The block diagram of the Example Computing Device for showing.
Fig. 5 to be a diagram that and manage personal information wearable according to the one or more technologies of the disclosure, computing device The flow chart of the exemplary operations of the display at equipment.
Specific embodiment
Computing device can be enabled in response to determining except being associated with computing device according to the technology of the disclosure Someone possibility outside the intended receiver of user and/or information can check the information in computing device output information, and Common information or personal information are exported optionally.For example, can to determine other using sonac right for computing device As if whether the no user for being close to computing device and/or being associated with computing device can check and treat to be exported by computing device Unique personnel of information.In some instances, computing device can be likely to check that calculating sets in the user of computing device Display information when standby, and be just likely in addition to the user or different from one or more other people of the user Forbid display information when computing device is checked.In other examples, can be with based on a determination that computing device be being currently used Individuality whether be associated with the computing device really, come optionally present the audio-frequency information for being provided to user, tactile data, The output of graphic display information or other forms.By this way, the technology of the disclosure can reduce inadvertently with remove The probability of the shared such personal information of individuality outside the intended receiver of personal information.
In entire disclosure, the example below is described, wherein only receiving to enter information from user in computing device During the license of row analysis, computing device and/or computing system just can be to information (such as positions that are associated with the computing device Put, speed etc.) be analyzed.For example, can collect in computing device or the feelings of the information being associated with user can be utilized In shape, chance can be provided a user with provide the program or feature that input to computing device whether can collect and Using user profile (such as the information of current location, present speed with regard to user etc.), or regulation computing device whether and/ Or how can receive may be with user-dependent content.Additionally, storing or making by computing device and/or computing system Before with particular data, the particular data can be processed in one or more modes so that can remove personal recognizable Information.For example, the identity of user can be processed so that the recognizable information of individual of user cannot be determined, or can obtained By the geographical position vague generalization (such as, to city, postcode or state county level level) of user in the case of positional information, make Obtain the ad-hoc location that cannot determine user.Thus, user can control computing device collection and using the letter with regard to the user The mode of breath.
Fig. 1 is to illustrate one or more technologies, display for managing personal information the example systems according to the disclosure The block diagram of system 1.As shown in the example of figure 1, system 1 includes computing device 10A to 10N (being referred to as " computing device 10 "), information Server system 40, and network 30.
Network 30 represents any public or special communication network, for example, cellular network, Wi-Fi, and/or for The other types of network of data is transmitted between computing device.Computing device 10 and information server system 40 can use any Suitable communication technology is carried out across a network 30 and sends and receives data.For example, computing device 10A can be by using network link 32A is being operably coupled to network 30, and computing device 10N can be operably coupled to using network link 32N Network 30.Information server system 40 can be operably coupled to network 30 by network link 32X.Network 30 can be wrapped Network backbone, the network switch, network router etc. are included, they are operatively coupled to take with information in computing device 10 Information is exchanged between business device system 40.In some instances, network link 32A to 32N and 32X (being referred to as " network link 32 ") Can be Ethernet, ATM or other network connections.Such connection can be wireless connection and/or wired connection.
In the example of fig. 1, computing device 10A is laptop computer, and computing device 10N is that wearable computing sets Standby (such as computerization wrist-watch, computerization glasses, computerization glove etc.).However, in other examples, computing device 10 Can be following any combinations:Tablet PC, mobile phone, personal digital assistant (PDA), laptop computer, game System, media player, E-book reader, TV platform, auto-navigation system or be configured to reception come self-information clothes The notices data of business device system 40 and export warning or any of the instruction that receives notice data is otherwise provided Other types of movement and/or stationary computing devices.
Each in computing device 10 can be classified as the type of computing device.In general, the class of computing device Type can be corresponding with the typical use of the characteristic of computing device and/or computing device.For example, computerization wrist-watch, computer Change glasses, computerization glove, computerization ring and the computerization wearable device that other are similar can be classified as class Type " wearable ", because such equipment is generally dressed by user.As another example, such as smart phone, tablet PC, The mobile device of E-book reader etc. can be classified as type " individual " because generally only unique user use and/or The display of such equipment is checked, and projector, desk computer, games system etc. can be classified as type " public ", because For may generally two or more user be able to may check such equipment display and/or because two or Plural different user is likely to while using and/or checking the computing device.Other of the type of computing device are shown Example includes " movement ", " individual ", " non-portable ", " on knee ", " desk-top ", and " sharing ".As below with reference to Fig. 2 and Fig. 3 institutes Discuss in more detail, each different types of computing device can be associated with following probability:Two different users can To check the display being associated with the equipment of the type, and the type of equipment can be to determine whether particular computing device will be aobvious Show a factor of personal information.
As shown in figure 1, computing device 10 (is referred to as including corresponding user interface facilities (UID) 12A to 12N respectively “UID 12”).The UID 12 of computing device 10 can serve as the corresponding input of computing device 10 and/or outut device.UID 12 Can be realized using various technologies.For example, UID 12 can serve as using the input equipment that there is sensitizing input screen, all Such as, resistive touch screen, surface acoustic wave touch screen, capacitive touch screen, projection-type capacitive touch screen, pressure sensitive screens, sound Wave impulse recognizes touch screen or another presser sensor Display Technique.UID 12 can serve as output (for example showing) equipment, should Outut device uses any one or multiple display devices, such as liquid crystal display (LCD), matrix display, light-emitting diodes Manage (LED) display, Organic Light Emitting Diode (OLED) display, electric ink or information output can be will be seen that to meter The similar monochrome display of the user of calculation equipment 10 or color display.In some instances, display device with calculate The presence sensitive equipment that equipment 10 includes can be physically isolated.
UID 12 may each comprise has sensitive display, and this has sensitive display and can receive and sets from corresponding calculating The sense of touch of standby 10 user.UID 12 can by detection from user (for example, with finger or touch-control pen touch or Point to UID 12 one or more position user) one or more gesture come receive sense of touch instruction.For example, UID 12 can be exported existing to present to user at sensitive display.The output can be rendered as corresponding figure by UID 12 User interface (for example, user interface 14A to 14N), the corresponding graphic user interface can be provided with computing device 10 Function is associated.For example, UID 12 can be presented each user interface, its with it is performing at the computing device 10 or can be by counting Calculating platform, operating system, application, and/or service (such as electronic information application, Internet-browser that calculation equipment 10 is accessed Using, Mobile operating system or desktop operating system etc.) function it is relevant.User can be with user interface interaction so as to succeed in one's scheme Calculation equipment 10 performs the corresponding operating relevant with function.
Computing device 10 can include that corresponding user interface (" UI ") module 20A to 20N (is referred to as " UI modules respectively 20 "), presence detection module 22A to 22N (being referred to as " presence detection module 22 "), and privacy module 24A to 24N (be referred to as " privacy module 24 ").Module 20,22, and 24 can be in computing device 10 and/or at the computing device 10 using residing in The software of execution, hardware, firmware or software, hardware, the mixing of firmware are performing described operation.Computing device 10 is equal Corresponding module 20,22 and 24 can be performed using one or more processor.Computing device 10 can be by corresponding module 20th, 22 and 24 execution are one or more virtual machine performed on the bottom hardware of computing device 10.Module 20,22 and 24 One or more service or the component of operating system or calculating platform for computing device 10 can be performed.Module 20, 22nd, and 24 can to perform be one or more executable program at the application layer of the calculating platform of computing device 10.UID 12 and module 20,22, and 24 can otherwise be arranged as in the long-range of corresponding computing device 10 and accordingly calculate setting Standby 10 can remotely access, for example, as one or more network service operated at the network 30 in network cloud.
Different from the computing device (for example, computing device 10A) in the computing device 10 for receiving notice from Dynamic display notifies that the technology of the disclosure enables based on notice, whether computing device 10A includes that personal information and calculating set Whether standby 10A is currently designated as exporting personal information optionally to export and redirect the notice.Optionally export Notice can include optionally output audio-frequency information, tactile data, graphic display information or be provided to other of user The output of form.In various embodiments, equipment or system are based on the currently used context (context) of equipment, the class of equipment Whether type or its combination, the equipment that automatically determines currently are designated as exporting personal information.In some instances, when with meaning When figure different someone of recipient is likely to personal information is not received, the currently used context of equipment is adapted to the private letter of output Breath.However, when or in addition someone different from intended receiver is likely to personal information is received, computing device is worked as Front content may be not suitable for exporting personal information.
If in addition to intended receiver someone by receive personal information determined probability meet threshold probability, This can be considered as " being likely to " and will receive personal information other people.For example, if equipment determines is intended merely to recipient in physics Upper on the scene, then the equipment can determine that (such as zero is close at least one other people by the probability for receiving personal information low , and such probability meets threshold probability zero).Used as another example, if equipment determines which is connected to projector, this sets The standby probability very high (such as is close to) that can determine that at least one other people will receive personal information, and so Probability be unsatisfactory for threshold probability.In general, threshold probability can be user configured, and can with check individual Other people of information are that the risk amount that particular recipient can be approved is corresponding.
Computing device 10A can receive the instruction (for example receiving from information system server 40) of incoming communication, and will The instruction of the incoming communication is provided to privacy module 24A.For example, computing device 10A can receive and ask the user whether to remember School connects the incoming communication (for example, receiving from spouse) of Sally.Privacy module 24A can be based on sender (for example, user Spouse) and name (such as " Sally ") in the text of incoming communication to their daughter include, determine incoming communication Including personal information.Privacy module 24A can ask existence information to determine whether user is likely to from presence detection module 22A Control computing device 10A and user or other people whether be likely to check user interface facilities 12A.
Presence detection module 22A can be received (such as camera, mike, to be present from one or more input equipment Sensitizing input equipment etc.), from motion sensor (such as accelerometer, gyroscope, compass etc.), from other types of sensing Device (such as sonac), from communication unit (for example, Bluetooth, Wi-Fi, Ethernet etc.), come comfortable computing device The operating system performed at 10A and other softwares and/or the information of hardware module from computing device 10A.By using The information for receiving, presence detection module 22A determine computing device 10A (such as at user interface facilities 12A) output for Whether the information of display is likely to be different from the people of the user being associated with computing device 10A is checked or can be in other ways Observation.That is, presence detection module 22A determines whether the people of user different from being associated with computing device 10A is on the scene and very May can check the information shown by computing device 10A.
Privacy module 24A can receive the output of computing device 10A so that whether the information for showing will be likely to by being different from The instruction that the people of the user being associated with computing device 10A is checked or can be observed in other ways.Under some examples, no matter Whether incoming communication includes personal information, and privacy module 24A can determine:If the output of computing device 10A is for display Information is likely to the people for being different from the user being associated with computing device 10A is watched or can be observed in other ways, then The notice of incoming communication or incoming communication itself should not be shown (for example, based on computing device 10A by computing device 10A Position, the current active application performed at computing device 10A, configuration status of computing device 10A etc.).That is, privacy module 24A can determine whether computing device 10A should show (that is, whether computing device 10 is currently designated as showing personal information Personal information).
Used as an example, privacy module 24A can be based at least partially on following determining that computing device 10A is current not It is designated to show personal information:It is current location (for example, residing for the yard in user) based on computing device 10A, current Activity application (for example, demoware), and being currently configured of computing device 10A (outside for for example, being connected to such as projector shows Show equipment), determine that computing device 10A is currently used for demonstration.For example, privacy module 24A determines that user interface facilities 12A works as Front user interface 14A exported including demonstration 16A.It is at least partly because privacy module 24A and determines that computing device 10A is worked as It is front to be just used for demonstration (that is, being currently not designated as showing personal information), so privacy module 24A determines do not have computing device 10A should not show personal information.Therefore, computing device 10A forbids the instruction for exporting incoming communication automatically.
Under each example, privacy module 24 can include incoming communication is analyzed to determine that the incoming communication includes The function of personal information.It is not any with what other people shared that the personal information used by the disclosure includes that the user of equipment is partial to Information.The information of the public or non-personal used by the disclosure includes any information different from personal information.Privacy mould Block 24 can receive the data of other components from computing device 10.For example, privacy module 24 can be received from presence inspection User's existence information of detection module is surveyed in the corresponding presence surveyed in module 22.Privacy module 24 can send data to calculating and set Standby 10 other components.For example, the figure including non-personal information can be indicated to send to UI modules 20 by privacy module 24.
The personal information with regard to user can be collected in the system as described herein of such as privacy module 24, or can be with Using user personal information in the case of, can provide a user with chance carry out control program or feature whether collect and with Which kind of degree is collecting information (for example social networkies, with regard to user, social action or activity, occupation, the user of user The information of the current location of preference or user), or control whether and/or how from content server receive may with The more relevant content in family.Additionally, before storing or using some data, this can be processed in one or more modes Particular data so that personal recognizable information can be removed.For example, the identity of user can be processed so that user cannot be determined The recognizable information of individual, or can in the case of positional information is obtained by the geographical position vague generalization of user (such as to city City, postcode or state county level level) so that the ad-hoc location of user cannot be determined.Thus, user can be for controlling how receive How the information and content server of collection relevant user uses the information.
Privacy module 24A can receive the instruction of incoming communication and determine that the incoming communication includes personal information.Privacy Module 24A can be based on incoming communication sender (for example, doctor, lawyer, accounting, spouse, close friend etc.), incoming communication it is interior Hold (for example, the text of incoming communication, the audio frequency of incoming communication, the picture material that includes in incoming communication etc.), and incoming logical The associated private sign of letter (for example, the incoming communication is designated as individual by sender manually), one or more predefines Privacy settings (such as geographical position of time of day, computing device 10A, the list of non-personal sender, and/or private transmission Person's list) etc., determine that incoming communication includes personal information.In some instances, privacy module 24A can appointing based on factor What combines to determine that incoming communication includes personal information.Used as an example, privacy module 24A can be based in incoming communication Including information (that is, system information) type come determine indicate computing device 10A battery levels or other system informations Incoming communication include personal information.Used as another example, privacy module 24A can be based on the present bit of computing device 10A Put (working space of such as user) to determine that incoming communication includes personal information.
When privacy module 24 being described as determining, whether incoming communication includes personal information and the phase in computing device 10 When answering computing device currently whether to be designated as showing personal information, information server system 40 can be performed in these actions One or more action, and whether particular computing device 10 currently can be designated as showing personal information and/or biography Enter whether communication includes that the instruction of personal information is provided to a computing device in the computing device 10 pointed by incoming communication. For example, (for example, Email or text disappear to notify incoming communication that trustship module 42 can receive from another server Breath).Privacy module 44 can be analyzed to determine whether the incoming communication includes personal information (for example, base to incoming communication In keyword, sender, the type of incoming communication, vision content for including in incoming communication etc.).
In privacy module 24A determines that computing device 10A is currently not designated as showing the example of personal information, privacy mould Block 24A can cause the different computing devices that computing device 10A and/or the identification of information server system 40 are associated from user (for example, computing device 10N) and the instruction of incoming communication is directed to the different computing devices for recognizing.In each example Under, information server system 40 can be safeguarded with regard to one or more in the computing device 10 that is associated with identical user The information of computing device, and the instruction of incoming communication or incoming communication can be forwarded in computing device 10 any one Individual computing device.Similarly, computing device 10A can be recognized and be communicatively coupled to computing device 10A (for example, via Wi- Fi, Bluetooth etc.) computing device 10 in one or more other computing device, and by this it is incoming communication forwarding Other computing devices into computing device 10.
Used as an example, computing device 10A can determine that computing device 10N is operably coupled to computing device 10A (such as via Bluetooth) and the instruction of incoming communication can be forwarded to into computing device 10N at least.In some examples Under, whether incoming communication can also be included that the instruction of personal information is forwarded to computing device 10N by computing device 10A.As another One example, computing device 10A will indicate that computing device 10A is currently not designated as showing that the message of personal information is sent to information Server system 40.In response to receiving the message, information server system 40 by one be associated with identical user or Multiple other computing devices of person are defined as being associated with computing device 10A (for example, computing device 10N), and other are calculated A computing device in equipment is identified as the possible alternative computing device of the instruction at least showing incoming communication.Any one In individual example, computing device 10N at least receives the instruction of incoming communication.
In response to receiving incoming communication, computing device 10N can be based at least partially on whether incoming communication includes private Whether people's information and computing device 10N are currently designated as showing personal information, determine whether to show the logical of incoming communication Know and/or incoming communication.Incoming communication is received from computing device 10A or information server system 40 in computing device 10N Whether include under the example of instruction of personal information, the privacy module 24N of computing device 10N can based on the instruction for being received come Determine that incoming communication includes personal information.In some instances, privacy module 24N at least can by above for privacy The content of the similar incoming communication that module 24A is discussed is analyzed, and determines whether incoming communication includes personal information.
For example, privacy module 24N can also pass through to determine different from the user that is associated with computing device 10N anyone It is likely to check the display device (for example, user interface facilities 12N) being associated with computing device 10N, determines calculating Whether equipment 10N is currently designated as showing personal information.In some instances, privacy module 24N can determine and be set with calculating Whether just whether the user that standby 10N is associated actively check the display device that is associated with computing device 10N and/or user Computing device 10N is being used actively.Determine that user is likely to check related to computing device 10N in computing device 10N Under the example of unique personnel of the display device of connection, privacy module 24N can determine that computing device 10N is currently designated as showing Personal information.Under these examples, user interface facilities 12N can export user interface 14N, and user interface 14N is at least wrapped Include the instruction 16N of incoming communication.In each example, indicate that 16N can be included in the personal information that incoming communication includes At least partially.
By this way, the technology of the disclosure can enable computing device to be based at least partially on the intention of information Whether recipient is likely to unique personnel of the information of checking is carried out optionally output information.By optionally output information, The technology of the disclosure can reduce probability inadvertently with other people shared personal informations.
Fig. 2 be a diagram that according to the disclosure it is one or more technologies, determine whether personal information to be exported to calculating The block diagram of the exemplary computing system of equipment.The information server system 60 of Fig. 2 is described under the context of Fig. 1 below.Fig. 2 is only illustrated One particular example of information server system 60, and many other examples of information server system 40 can be at other Under example using and the subset of the component that exemplary information server system 40 includes can be included in or Fig. 2 can be included Unshowned add-on assemble.
As shown in the example of figure 2, information server system 40 include one or more processor 50, one or more Communication unit 52, and one or more storage device 54.The storage device 54 of information server system 40 includes notifying support Tube module 42, privacy module 44, and device location module 62.The storage device 54 of information server system 40 further includes to lead to Know information data storing equipment 58 and facility information data storage device 60.During communication channel 56 can make component 50,52 and 54 Each interconnection carrying out inter-component communication (physically, communicatedly and/or operatively).In some instances, communication channel 56 can include system bus, network connection, interprocess communication data structure or any other side for transmission data Method.
One or more communication unit 52 of information server system 40 can be by transmission and/or reception in such as net One or more computing device in network signal on one or more network of network 30, with such as computing device 10 External computing device communication.For example, information server system 40 can using communication unit 52 come via link 32 transmission and/ Or radio signal is received, to exchange information with one or more in computing device 10.The example of communication unit 52 includes NIC (for example, such as Ethernet card), optical transceiver, RF transceiver, gps receiver or can send and/ Or other any kind of equipment of receive information.The other examples of communication unit 52 can include short-wave radio, honeycomb number According to radio, wireless ethernet network radio and USB (universal serial bus) (USB) controller.
One or more storage device 54 in information server system 40 can be with storage information, with information server Processed during the operation of system 40 that (for example, information server system 40 can be stored at information server system 40 and hold The data accessed by module 42,44 and 62 between the departure date).In some instances, storage device 54 is temporary memory, it is intended that storage The main purpose of equipment 54 is not longer-term storage.Storage device 54 on information server system 40 can be with:Deposit as volatibility Reservoir being arranged to short-term storage information, and therefore, if off stored content cannot be kept.Volatibility is deposited The example of reservoir includes random access memory (RAM), dynamic random access memory (DRAM), static RAM (SRAM), and other forms known in the art volatile memory.
In some instances, storage device 54 also includes one or more computer-readable recording medium.Storage device 54 can be configured to store more substantial information than volatile memory.Storage device 54 can be used as nonvolatile memory Space is being further configured to the longer-term storage of information, and after the unlatching/closing cycle keeps information.It is non-volatile The example of memorizer includes:Magnetic hard-disk, CD, floppy disk, flash memory or electrically-programmable memory (EPROM) or electrically erasable The form of programmable (EEPROM) memorizer.Storage device 54 can store with module 42,44, and 62 programmed instruction being associated And/or data.
One or more processor 50 can be realized function and/or perform the instruction in information server system 40. For example, the processor 50 of information server system 40 can receive and perform the instruction that stored by storage device 54, and the instruction is held Row module 42,44, and 62 function.During program performing, these instructions performed by processor 50 can cause information to take Business device system 40 is stored information in storage device 54.Processor 50 can with performing module 42,44, and 62 instruction with will be logical Know.That is, module 42,44, and 62 Can be operated by processor 50 with each action of execution information server system 40 or function.
Data storage 58 and 60 is represented for storing any suitable of the data relevant with data and context information is notified Storage medium.For example, announcement information data storage 58 can be stored by the notice data for notifying that trustship module 42 is received, and Facility information data storage 60 can store the information with regard to one or more equipment being associated with specific user, the information Can receive from one or more computing device 10.
Be stored in announcement information at data storage device 58 can by notify trustship module 42 according to the announcement information Each associated attribute is classifying, organize, and/or access.For example, except (for example, being associated with announcement information including content Information, text that the announcement information and message, calendar reminding etc. are associated, video, image etc.) outside, by information Each part for the announcement information that server system 40 is received can include one or more attribute, notify trustship module 42 Using the attribute is for which route in determining when output notice information and/or computing device 10 or delivers logical Know information.
The attribute included in announcement information can include user identifier --- such as:User's name, account name Title, telephone number, network identifier, e-mail address etc., the user identifier indicate the user being associated with announcement information Recipient, for the user recipient, computing device 10 can be warned and/or otherwise be provided based on announcement information output The access of the information to being associated with announcement information.Notify that trustship module 42 can be according to user identifier by the notice for receiving Information Store is at data storage 58, and can notify that data are deposited from data to retrieve by inquiring about based on user identifier The notice data of storage equipment 58.
In some instances, announcement information can include sender's identifier, and sender's identifier indicates incoming communication Origin.For example, Email or instant message notify that data can include specifying the user being associated with incoming communication " to send out The attribute of the e-mail address or instant message account of the person of sending ".In other words, sender's identifier can be indicated and key in electricity The name on account that the people of sub- mail or instant message is associated, the Email or the instant message notify letter with being stored in Cease the announcement information at 58 to be associated.
In some instances, being stored in the announcement information at announcement information data storage device 58 can include and the notice Whether the associated incoming communication of information includes the instruction of personal information.In order to determine whether incoming communication includes personal information, Privacy module 44 can be analyzed to the content of each attribute of incoming communication and/or incoming communication.It is as an example, hidden The content analysis module 64 of private module 44 can be analyzed to the content of text of incoming communication, indicate personal information to determine Whether one or more keyword or phrase are included in the text of incoming communication.In some instances, privacy module 44 can also be analyzed to the picture material of incoming communication.For example, privacy module 44 can to picture, video or other View data is analyzed, to determine whether picture material includes indicating private object.
Used as another example, customer relationship module 66 can determine the pass between the sender and recipient of incoming communication System.The relation can be family relation between sender and recipient, pair bond or other interpersonal type of relationship. Under some examples, the relation can be based on social network information, the contact details of storage, user configured relation information etc. come really It is fixed.Based on the relation between sender and recipient, customer relationship module 66 can determine that incoming communication includes personal information.Example Such as, if sender is married with recipient, can be privacy communication by incoming communication marks.As another example, if Sender is enterprise and recipient is the client of the enterprise, then customer relationship module 66 can determine that incoming communication does not include private People's information.
Privacy module 44 make it is last determine before whether incoming communication can be included one of personal information or Multiple different determinations are analyzed.For example, customer relationship module 66 can based on the relation between sender and recipient come Determine that incoming communication does not include personal information, while content analysis module 64 determines that the content of text of incoming communication does not include individual Information.Privacy module 44 can be analyzed to two kinds of determinations and weighting can be applied to the determination to make finally really It is fixed.As an example, compared with the determination done by customer relationship module 66, heavier weighting can be answered by privacy module 44 For the determination done by content analysis module 64.Used as another example, privacy module 44 is can be arranged such that if to passing Any analysis for entering communication causes incoming communication to include the determination of personal information, then regardless of other it is originally determined in any one or Whether the whole result of person indicates that incoming communication includes personal information, and privacy module 44 all determines that incoming communication includes private letter Breath.
Privacy module 44 it may also be determined that one in the computing device 10 that is associated with the recipient of incoming communication or It is multiple whether to show personal information (that is, being currently designated as showing personal information).As an example, privacy module 44 The positional information of each in the computing device 10 being associated with recipient can be received from device location module 62.Equipment position Putting module 62 can ask the current location information of the computing device 10 being associated with the recipient of incoming communication (for example, to respond Incoming communication is received in information server system 40) and current location information is provided to privacy module 44.In some examples In, location type can be associated by device location module 62 with the current location of a computing device in computing device 10. For example, if computing device 10A is at the position corresponding with the working space of recipient, device location module 62 can be with The location type that " will work " is applied to the position of computing device.As another example, if computing device 10A is in and recipient The corresponding position of family, then device location module 62 " family " location type can be applied to the position of computing device 10A.Make For another example, if computing device 10A is in the position corresponding with utility plant, device location module 62 can be by " public " location type is applied to the position of computing device 10A.In any example, except in computing device 10 or Outside multiple corresponding current locations or alternatively, device location module 62 can provide relevant position type to hidden Private module 44.
Privacy module 44 can also be based at least partially on the type of a computing device in computing device 10, determine Whether a computing device in computing device 10 is currently designated as showing personal information.For example, if computing device 10A tool There is type " on knee ", then privacy module 44 can determine that computing device 10A is currently more likely just checked simultaneously more than a people And determine that computing device 10A is currently not designated as showing personal information.As another example, if computing device 10N has Type " wearable " (such as wrist-watch, glasses, ring, glove etc.), then privacy module 44 can determine that computing device 10N is current not Just may be checked by anyone in addition to user very much, and determine that computing device 10N is currently designated as showing private letter Breath.
Privacy module 44 can be based at least partially in computing device 10 which be currently designated as showing private letter Cease select in computing device 10 which or which send incoming communication.For example, if computing device 10A is current It is not designated as showing personal information and computing device 10N is currently designated as showing personal information, then information server system System 40 at least can send the instruction of incoming communication to computing device 10N.Under some examples, information server system 40 is also Can send whether privacy module 44 determines that particular computing device 10 is currently designated as showing the instruction of personal information.Information takes Business device system 40 can also send whether incoming communication includes the instruction of personal information.That is, information server system 40 can be sent out Send whether incoming communication, destination's computing device 10 are currently designated as showing the instruction of personal information (for example, such as privacy module Determined by 44), incoming communication whether include instruction or any combination of them of personal information.
Fig. 3 be a diagram that the mobile meters one or more technologies, determining whether display personal information according to the disclosure The block diagram of calculation equipment.The computing device 80 of Fig. 3 is described in the context of Fig. 1 below.Fig. 3 illustrate only of computing device 80 Particular example, and many other examples of computing device 80 can under other examples using and example meter can be included in The subset of the component included by calculation equipment 80 can include the unshowned add-on assembles of Fig. 3.
As shown by example in fig. 3, computing device 80 includes that one or more processor 82, one or more output set Standby 84, user interface facilities 86 (" UID 86 "), one or more communication unit 88, one or more input equipment 90, One or more sensor 92, and one or more storage device 94.The storage device 94 of computing device 80 also includes UI Module 100, privacy module 102, presence detection module 104, and operating system 106.Computing device 80 can include add-on assemble, For the sake of clarity, not shown add-on assemble in figure 3.For example, computing device 80 can include the group to computing device 80 Part provides the battery of electric power.Similarly, the component of the computing device 80 shown in Fig. 3 may in each example of computing device 80 It is not necessarily necessary.For example, in some configurations, computing device 80 may not include outut device 84.
Each in component 82,84,86,88,90,92 and 94 interconnection can be led to by communication channel 96 for inter-module Letter (physically, communicatedly, and/or operatively).In some instances, communication channel 96 can include that system bus, network connect Connect, interprocess communication data structure or any other method for transmission data.
One or more processor 82 can be realized function and/or perform the instruction in computing device 80.For example, exist Processor 82 in computing device 80 can receive and perform the instruction that stored by storage device 94, the instruction performing module 100, 102 and 104 function.During program performing, 80 pairs of letters of computing device can be caused by these instructions that processor 82 is performed Breath --- one or more data file being stored in storage device 94 --- is read out/writes.Processor 82 can with performing module 100,102,104, and 106 instruction so that UID 86 exports one or more figure of incoming communication Shape is indicated using the content as user interface for the display at the UID 86.That is, module 100,102, and 104 can be can be by Processor 82 is operated to perform each action or the function of computing device 80, for example so that UID 86 is presented at UID 86 Graphic user interface.
One or more communication unit 88 of computing device 80 can be by transmission and/or reception at one or more Network signal on network, using one or more wired or WAPs come via one or more it is wired and/ Or wireless network and external device communication.The example of communication unit 88 includes NIC (for example, such as Ethernet card), light Learn transceiver, RF transceiver, gps receiver, Bluetooth, Wi-Fi or can send and/or receive information other Any kind of equipment.The other examples of communication unit 88 can include short-wave radio, cellular data radio, wireless network Radio and USB (universal serial bus) (USB) controller.
One or more outut device 84 of computing device 80 can generate output.The example of output be tactile output, Audio output and video frequency output.In one example, the outut device 84 of computing device 80 includes there is sensitive display, sound Card, video graphics adaptor card, speaker, cathode ray tube (CRT) monitor, liquid crystal display (LCD) or for generating To other any kind of equipment of the output of people or machine.
One or more input equipment 90 of computing device 80 can be with receives input.The example of input be sense of touch, Audio input and video input.In one example, the input equipment 90 of computing device 80 includes there is sensitive display, touches Touch sensitive screen, mouse, keyboard, voice response sexual system, video camera, mike or be used for detection from people or machine Other any kind of equipment of the input of device.
In some instances, the UID 86 of computing device 80 can include the work(of input equipment 90 and/or outut device 84 Energy.In the example of fig. 3, UID 86 can be or can include there is sensitizing input equipment.In some instances, exist quick Sense input equipment can detect the object at screen and/or near screen.As an example ranges, there is sensitizing input Equipment can be with detection object, such as at 2 inches of screen or less than the finger or pointer in the range of 2 inches.Exist Sensitizing input equipment can determine the position (such as (x, y) coordinate) for detecting object of screen.In another example ranges, deposit The object away from 6 inches of screen or less than 6 inches can be detected in sensitizing input equipment, and other scopes are also possible. There is sensitizing input equipment to determine by using electric capacity technology of identification, inductance technology of identification, and/or optical recognition By the finger of user come the position of the screen of selection.In some instances, there is sensitizing input equipment can also for example aobvious Show at device using with regard to the tactile described by outut device 84, audio frequency or visual transmission come will output provide to user. In the example of Fig. 3, UID 86 is presented graphic user interface, the graphic user interface 14 of such as Fig. 1.
Although being illustrated as the intraware of computing device 80, UID 86 is also represented by external module, the external module With 80 shared data path of computing device, for transmission and/or receives input and output.For example, in one example, UID 86 installed with built-in component (for example, screen on a cellular telephone) for representing computing device 80, the installed with built-in component are located at computing device 80 Outer enclosure thing in and be physically connected to the outer enclosure thing.In another example, UID 86 represents computing device 80 external module (for example, with the tablet PC shared wiredly and/or wirelessly monitor of data path, projector etc.), should External module is located at the encapsulation beyond the region of objective existence of computing device 80 and is physically isolated with the encapsulant.
Sensor 92 can detect one or more object near computing device 80, the shifting of survey calculation equipment 80 It is dynamic, and the other information being associated with computing device 80 can be collected.For example, include that at least one ultrasound is passed in sensor 92 Under the example of sensor, sensor 92 can send ultrasonic ping and detect ultrasonic ping from the object near the computing device 80 Reflection (that is, echo).Based on the reflection of the ultrasonic ping for detecting, computing device 80 is (such as by using object detection mould 118) block can determine whether one or more object is close to computing device 80.Detection and/or the shifting of survey calculation equipment 80 The example of dynamic sensor 92 can include but is not limited to accelerometer and gyroscope.For example, sensor 92 can be configured to The position of survey calculation equipment 80, rotation, speed, and/or acceleration.Sensor 92 can also be sensed including buckle (clasp) Device (for example, in computing device 80 be the wearable computing devices with buckle example in), electric skin response sensor, Yi Jineng Enough sensors collected with any other type of the relevant information of computing device 80.
One or more storage device 94 in computing device 80 can be with storage information, in computing device 80 Process during operation (for example, computing device 80 can with memory module 100,102, and 104 term of execution at the computing device 80 The data that can be accessed).In some instances, storage device 48 is temporary memory, it is intended that the main purpose of storage device 48 It is not longer-term storage.Storage device 48 in computing device 10 can be with:Short-term is arranged to as volatile memory Storage information, and therefore, if turned off cannot then keep stored content.The example of volatile memory includes at random Access memorizer (RAM), dynamic random access memory (DRAM), static RAM (SRAM), and this area is The volatile memory of the other forms known.
In some instances, storage device 94 also includes one or more computer-readable recording medium.Storage device 94 can be configured to store more substantial information than volatile memory.Storage device 94 can be used as nonvolatile memory Space is being further configured to longer-term storage information, and after the unlatching/closing cycle keeps information.It is non-volatile to deposit The example of reservoir includes:Magnetic hard-disk, CD, floppy disk, flash memory or electrically-programmable memory (EPROM) or electrically erasable can The form of programming (EEPROM) memorizer.Storage device 94 can store with module 100,102, and 104 and operating system 106 Associated programmed instruction and/or information (such as data).
In some instances, the operation of the component of 106 control computer equipment 80 of operating system.For example, in an example In, operating system 106 promote UI modules 100, privacy module 102, and presence detection module 104 and processor 82, or Multiple outut devices 84, user interface facilities 86 (" UID 86 "), one or more communication unit 88, one or more is defeated Enter equipment 90, and one or more sensor 92 communication.UI modules 100, privacy module 102, and presence detection module 104 May each comprise the programmed instruction and/or data that can be performed by computing device 80 (such as by one or more processor 82). Used as an example, UI modules 6 can include that computing device 80 is performed in operation and action described by the disclosure Individual or multiple instruction.
When the user of computing device 80 checks output at UID 86 and/or provides input, UI modules 100 can be caused 86 output pattern user interfaces of UID (such as graphic user interface 14A, 14N) are for display.When user is in different time and figure During shape user interface interaction and when user and computing device 80 are in diverse location, UI modules 100 and UID 86 can connect Receive one or more instruction of the input from user.UI modules 100 and UID 86 can be explained and be detected at UID 86 Input (for example, when user UID 86 display graphic user interface one or more position at provide one or During multiple gestures), and can to one or more the associated platform, operating system performed at the computing device 80, Using, and/or input of the service relay with regard to detecting at UID 86 information so that 80 perform function of computing device.
UI modules 100 can receive one or more associated platform, the behaviour for perform at comfortable computing device 80 Make system, application, and/or the information for servicing and instruction, for generating graphic user interface.Additionally, UI modules 100 can be filled When one or more associated platform, operating system, application, and/or service and calculating for performing at computing device 80 Between each outut device (for example, speaker, LED indicator, audio frequency or electrostatic haptic output devices etc.) of equipment 80 Intermediary, produces output (for example, figure, flash of light, sound, haptic response etc.) with using the computing device 80.
Computing device 80 can receive incoming message (for example, from the information system server 40 of Fig. 2 via communication unit 88 Receive).Incoming communication of the output for showing instruction (figure that for example, UID 86 is exported is indicated, in outut device 84 The instruction that exported of an outut device etc.) before, privacy module 102 can determine whether the incoming communication includes private letter Whether breath and computing device 80 are currently designated as showing personal information.
As shown in figure 3, privacy module 102 includes content analysis module 108, user accounts manager module 110, and user Relationship module 112.Under each example, content analysis module 108 and customer relationship module 112 can perform with regard to Fig. 2 institutes The content analysis module 64 and customer relationship module 66 of the information server system 40 for showing is come those intimate work(for describing Energy.For example, content analysis module 108 can be analyzed to the content of text of incoming communication, indicate personal information to determine Whether one or more keyword or phrase are included in the text of incoming communication.As another example, content analysis Module 108 can be analyzed to the picture material of incoming communication, to determine whether any image of incoming communication includes individual Information.
As another example, content analysis module 108 can determine incoming communication whether include private sign (for example, by Position or indicate whether incoming communication includes the messaging services of personal information that sender is arranged).If being provided with privacy Indicate, then content analysis module 108 can determine that incoming communication includes personal information, and if being not provided with private sign, then Content analysis module 108 can determine that incoming communication does not include personal information.Used as another example, content analysis module 108 can Determine with based on the included type for painting word in incoming communication whether incoming communication includes personal information.It is general and Speech, paints the unified code sign that word is the things such as emotion or action.In some instances, based on in incoming communication Included paints the associated emotion of word and/or action, and content analysis module 108 can determine whether incoming communication includes private People's information.
Customer relationship module 112 can determine that the relation and recipient between is sent out in the transmission of incoming communication, and based on this Relation come determine it is incoming communication include personal information.The relation can be family relation between sender and recipient, spouse Relation or other interpersonal type of relationship.Under some examples, the relation can be the connection based on social network information, storage It is relation information that information, user are configured etc. determining.Based on the relation between sender and recipient, customer relationship mould Block 66 can determine that incoming communication includes personal information.For example, if sender is married with recipient, incoming can lead to Beacon is designated as privacy communication.As another example, if sender is enterprise and recipient is the client of the enterprise, user Relationship module 66 can determine that incoming communication does not include personal information.
Customer relationship module 112 is it may also be determined that being confirmed as being close to computing device 80 or being determined likely to connect The personal information that receipts are exported by computing device 80 one or more other people and the intended receiver of incoming communication between Relation.Customer relationship module 112 can recognize one or more other people (for example, using facial recognition techniques recognizing In the image captured using the camera of computing device 80 included one or more other people).Based on this or Multiple everyone identity in other people, customer relationship module 112 can determine the user of computing device 80 with this or Corresponding relation between everyone in many individuals of person.The relation can be family relation between sender and recipient, match somebody with somebody Even relation or other interpersonal type of relationship.Under some examples, the relation can be based on social network information, be stored Contact details, the relation information that configured of user etc. to be determining.
In some instances, customer relationship module 112 can sending out based on the user in computing device 80 and incoming communication Relation between the person of sending and computing device 80 user be confirmed as being close to computing device 80 one or more other The comparison of the relation between everyone in people, determines whether computing device 80 is currently designated as showing personal information.Example Such as, if with the relation of sender be pair bond or family relation and with other people relation for being close to computing device 80 And pair bond, then customer relationship module 112 can determine computing device 80 be currently designated as show personal information.As Another example, if being family relation with the relation of sender and being same with the relation of at least one other people for being close to user Thing, then customer relationship module 112 can determine computing device 80 be currently not designated as show personal information.
User accounts manager module 110 can determine which user account is movable at computing device 80.One In a little examples, computing device 80 can be configured with the different user account for different user, and (for example, each kinsfolk is each There are an account, the personal account for same subscriber and work account etc.).Incoming communication can be led to and user account In the associated user of a user account.User account management module 110 can determine and the incoming use for communicating and being associated Family account and determine that whether the user account of current active is and the incoming user account being associated that communicates.The use of current active Family account is current certified (for example unlocking) user account.In some instances, computing device 80 may be at locking State so that do not have the user account that user account is current active.In these examples, user account management module 110 can It is movable and by such instruction offer to privacy module 44 to determine currently without user account.
Privacy module 102 is it may also be determined that the type of computing device 80, and is based on the type, determines that computing device 80 is worked as It is front whether to be designated as exporting personal information.In general, when the type of computing device 80 receives the type with unique user When the output that equipment is made is associated, privacy module 80 can determine that computing device 80 is currently designated as exporting personal information, And when the output that the equipment that the type of computing device 80 receives the type with multiple users is made is associated, the privacy module 80 can determine that computing device 80 is currently not designated as exporting personal information.It is defeated with what the computing device for receiving the type was made The example of the type of the associated computing device of the unique user that goes out including but not limited to " movement ", " individual ", " wearable ", and " individual ".The example bag of the type of the computing device that the output that the computing device for receiving the type with multiple users is made is associated Include but be not limited to " non-portable ", " public ", " on knee ", " projector ", " television set ", " desktop ", and " sharing ".
Privacy module 102 can be based not only on by text analysis model 108, user accounts manager module 110, and user The determination that relationship module 112 is made, is also based on the determination made by presence detection module 104, determines computing device 80 Whether the instruction of incoming communication at least should be exported.As shown in figure 3, presence detection module 104 include face detection module 114, Audio detection module 116, and obj ect detection module 118.Generally there are detection module 104 and can determine whether user receives The control of computing device 80, user currently whether seeing computing device 80, and any other user currently whether be likely to Computing device 80 is being seen.
Face detection module 114 can be received by a view data for capturing in input equipment 90 (for example, by phase Video data that machine is captured, static image data etc.) and determine whether view data includes that one or more is individual. In some examples, face detection module 114 can determine whether view data includes one or more face.If picture number According to more than one face is included, then face detection module 114 is can determine in addition to the user except being associated with computing device 80 Someone be likely to check display and any personal information that may be exported by computing device 80 can be checked.Cause This, in these examples, face detection module 114 can determine that computing device 80 is currently not designated as exporting personal information. In other examples, face detection module 114 can determine that view data is only facial including one.In response to determining in image It is only facial including one in data, face detection module 114 can perform facial recognition techniques with determine the face be whether with The associated user of computing device 80.If the face is not the user being associated with computing device 80, face detection module 114 can determine that computing device 80 is currently not designated as exporting personal information.If the face is related to computing device 80 The user of connection, then face detection module 114 can determine computing device 80 be currently designated as export personal information.
Audio detection module 116 can be to being captured by the input equipment (such as mike) in input equipment 90 Environmental audio data are analyzed.Voice data can include audio level information and/or the audio frequency itself for capturing.At some In example, audio detection module 116 can be analyzed to voice data, to determine the voice being associated with more than one user Whether it is included in voice data.If more than one voice is detected in voice data, audio detection module 116 can To determine that computing device 80 is currently not designated as exporting personal information.Audio detection module 116 can also be entered to voice data Row analysis, to determine that whether the voice that captures in voice data is the voice of the user being associated with computing device 80.Example Such as, audio detection module 116 can perform audio volume control analysis, by the voice captured in voice data and user speech Sample be compared.If audio detection module 116 determines the voice of the voice and user captured in voice data Match somebody with somebody, then audio detection module 116 can determine that computing device 80 is currently designated as exporting personal information.If however, audio frequency Detection module 116 determine capture in voice data more than one voice and/or if capture in voice data to A few voice is mismatched with the voice of user, then audio detection module 116 can determine that computing device 80 is not currently designated To export personal information.
In some instances, audio detection module 116 can provide voice data to remote computing system.Remote computation System may also receive from the voice data of another computing device and carry out the voice data from each computing device Relatively.If the voice data that each computing device from two different computing devices is received have identical or The signature of basic simlarity, then computing system can determine that two computing devices are closer to each other.
Presence detection module 104 is also based on from one or more sensor 92 information for receiving, and determines meter Whether calculation equipment 80 is current in the span of control of user.For example, it is wearable computing devices in computing device 80 and passes Sensor 92 includes under the example of the sensor (such as gyroscope, accelerometer etc.) of buckle sensor and detection motion there is inspection Survey module 104 and can determine whether user is currently just dressing computing device 80.As an example, if buckle sensor is indicated Buckle is closed and motion sensor indicates that computing device 80 has been moved recently, then presence detection module 104 can determine use Computing device 80 is currently just being dressed at family, and is based on the determination, it may be determined that computing device 80 is currently designated as showing private Information.As another example, it is at least one biography that smart phone and sensor 92 include detection motion in computing device 80 Under the example of sensor, presence detection module 104 can determine whether user is currently in use phone.For example, if phone is in lock Determine state and sensing data indicates that phone is moved, then presence detection module 104 can determine that user does not currently have It is currently in use phone and can determine that computing device 80 is currently not designated as exporting personal information.If phone is in unblock State and currently not do not moving or moving according to the mode that is held by a user is met, then presence detection module 104 Can determine that user is being currently used phone and can determine that computing device 80 is currently designated as exporting personal information.
In some examples, presence detection module 104 can also be based at least partially near computing device 80 Other objects, determine whether computing device 80 is currently designated as exporting personal information.If other objects physically position In the threshold distance of computing device 80 (for example, in 10 feet, 50 feet etc.), in wireless with 80 identical of computing device Reachable etc. on network, via Bluetooth, then other objects may be close to computing device 80.
The obj ect detection module 118 of presence detection module 104 can be based on from one or more sensor 92 and/or logical The information that letter unit 88 is received, determines whether one or more other object is close to computing device 80.For example, object inspection Survey module 118 can cause one or more sonac of sensor 92 send ultrasound wave (that is, ultrasonic ping) and Reception of echoes (for example, reflection of the ultrasound wave from one or more object).Sonac can be configured to sending super Reception of echoes in threshold amount of time after sound wave.Can be configured to adjust can for threshold amount of time (and intensity of ultrasound wave) To detect the ultimate range of object.Sonac can provide the instruction of the echo for receiving (i.e. echo data) to right As detection module 118, the obj ect detection module 118 can be analyzed to echo data, to determine one or more object Whether computing device 80 is close to.In some instances, obj ect detection module 118 can be analyzed to echo data, and really The shape of each object in fixed one or more object.Based on the shape of corresponding object, obj ect detection module 118 can be true Determine the type (for example, whether object is people, computing device, furniture etc.) of object, and be based on the type, determine computing device 80 Whether personal information (that is, be currently designated as export personal information) should be shown.For example, if the object for detecting is determined For furniture, then presence detection module 104 can determine that computing device 80 should show personal information.If however, detected Object is confirmed as another person, then presence detection module 104 can determine that computing device 80 should not show personal information.
Obj ect detection module 118 is it may also be determined that whether one or more miscellaneous equipment is located near computing device 80. For example, in communication unit 88 includes the wireless examples of Bluetooth, obj ect detection module 118 can cause Bluetooth Scanning radio is via Bluetooth reachable equipment and receives from via Bluetooth reachable any other equipment Bluetooth signed datas.Bluetooth radio can provide Bluetooth signed datas to obj ect detection module 118, the obj ect detection module 118 can be analyzed to Bluetooth signed datas, set with determining whether there is close calculating Standby 80 any other equipment, and if there is being close to any other equipment of computing device 80, it is determined that close calculating sets Whether any equipment in standby 80 equipment is not associated with the recipient of incoming communication that (that is, any equipment in equipment is The user of the no recipient with different from incoming communication is associated).
Used as another example, obj ect detection module 118 can cause the Wi-Fi radio of communication unit 92 using equity Wi-Fi --- which can also be referred to as Wi-Fi direct --- is scanning miscellaneous equipment (such as attempting to connect to miscellaneous equipment).One As for, reciprocity Wi-Fi is a kind of mechanism, can be connected to each other by two different equipment of the mechanism and without the need for wireless access Point.Obj ect detection module 118 can determine whether one or more miscellaneous equipment can be reachable using equity Wi-Fi, and And if it is, receive the device identifier of each equipment in miscellaneous equipment.In some instances, device identifier includes matchmaker Body access control (MAC) address information.By using the mac address information, obj ect detection module 118 can recognize that other set It is standby, and determine whether the miscellaneous equipment is associated with the user of computing device 80 (that is, the recipient of incoming communication).With so Mode, obj ect detection module 118 can determine whether one or more miscellaneous equipment is close to computing device 80, but regardless of meter Whether calculation equipment 80 is connected to Wi-Fi network, and if computing device 80 is connected to Wi-Fi network, then regardless of miscellaneous equipment Whether it is connected to and 80 identical Wi-Fi network of computing device.
Obj ect detection module 118 it may also be determined that with 80 identical wireless network of computing device on the presence or absence of it is multiple not With equipment, and if it is, determine different equipment whether with the user of the computing device 80 (reception of i.e. incoming communication Person) it is associated.If with 80 identical wireless network of computing device on exist optional equipment and the optional equipment not with meter The user of calculation equipment 80 is associated, then presence detection module 104 can determine that computing device 80 is currently not designated as output private People's information.If optional equipment is associated with user or if any other equipment is not identified as by obj ect detection module 118 Computing device 80 is close to, then presence detection module 104 can determine that computing device 80 is currently designated as exporting personal information.
Privacy module 102 may also receive from the positional information of device location module 120.Device location module 120 can To perform those the intimate functions with the device location module 62 shown in Fig. 2.For example, device location module 120 can be with Receive the positional information of the sensor (such as GPS sensor) in sensor 92 and determine working as computing device 80 Front position.In some instances, device location module 120 can be related to the current location of computing device 80 by location type Connection.For example, if computing device 80 is in the position corresponding with the working space of recipient, device location module 120 can The position of computing device is applied to the location type that " will work ".As another example, if computing device 80 in reception The corresponding position of the family of person, then device location module 120 " family " location type can be applied to the position of computing device 80. As another example, if computing device 80 is in the position corresponding with utility plant, device location module 120 can be by " public " location type is applied to the position of computing device 80.In any example, except in computing device 80 or Outside multiple corresponding current locations or alternatively, device location module 120 can by relevant position type provide to Privacy module 102.
Privacy module 102 can based on module 104,108,110,112,114,116,118, and determination done by 120 And any combinations of any other non-final determination done by privacy module 102, make with regard to whether incoming communication wraps Include personal information and whether computing device 80 is currently designated as exporting the last determination of personal information.In general, " non-most Determine afterwards " it is whether to include whether personal information and/or computing device 80 are currently designated as showing private with regard to incoming communication Whether any determination of information, shown the last determination of personal information different from final management and control by computing device 80.Finally determine Non-final determined combination is based on by privacy module 102 generally and is made.
Presence detection module 104 can provide each non-final determination to privacy module 102.As an example, deposit Detection module 104 can by module 114,116,118, and each non-final determination done by 120 and there is detection mould Any non-final determination done by block 104 is provided to privacy module 102.Used as another example, presence detection module 104 can be with Single determination is analyzed and is generated to each non-final determination to provide to privacy module 102.
Make it is last determine when, privacy module 102 can make it is last determine when to non-final determination in it is each It is individual to be weighted.For example, compared with the determination done by text analysis model 108, privacy module 102 can be to by presence detection Module 104 is made, computing device 80 is currently designated as output personal information and is set for out really the heavier weighting of weight.As Another example, is currently not designated as showing personal information (for example, base with made by face detection module 114, computing device The determination of the display of computing device 80 is currently being seen in someone in addition to user) determination compare, privacy module 102 Can be made by device location module, computing device 80 be currently designated as showing that personal information (for example, is set based on calculating Standby 80 determinations in " family " position) it is set for out really the less weighting of weight.
Privacy module 102 makes the last determination about whether at least one instruction for exporting incoming communication.In response to true The fixed instruction at least exporting incoming communication, privacy module 102 figure that UI modules 100 generate incoming communication is indicated for Shown by UID 86.At least one instruction of incoming communication is not exported in response to determining, privacy module 102 is forbidden so that by calculating Equipment 80 exports the figure of incoming communication and indicates, and computing device 80 can be caused in various embodiments to send a message to letter Breath server system 40, the message indicate that computing device 80 is currently not designated as exporting personal information and/or incoming communication bag Include personal information.
Fig. 4 is a diagram that according to the one or more technologies of the disclosure, output pattern content in remote equipment The block diagram of the Example Computing Device that place shows.In general, graphical content can include exporting regarding for any of display Feel information, text, image, one group of mobile image etc..Example shown in Fig. 4 includes computing device 130, there is sensitive display Device 134, communication unit 140, projector 150, projecting apparatus screen 152, mobile device 156, and visual display device 160.Although Independent computing device 10 and 80 is shown as exemplary purposes in Fig. 1 and Fig. 3, but such as computing device 130 Computing device can generally be to include processor or other the suitable computing environment and such as performing software instruction Any component or system that there is sensitive display need not be included.
As shown in the example of Fig. 4, computing device 130 can be the place of the function of including describing with regard to the processor 82 of Fig. 3 Reason device.In such an example, computing device 130 can be operably coupled to presence sensitivity by communication channel 132A Display 134, communication channel 132A can be system bus or other suitable connections.As further described below, calculate Equipment 130 can also be operably coupled to communication unit 140 by communication channel 132B, and communication channel 132B can also be System bus or other suitable connections.Although shown separately for example in the diagram, computing device 130 can be with It is operably coupled to by any number of one or more communication channel and there is sensitive display 134 and communication unit Unit 140.
In other examples, illustrated in the computing device 10 and 80 of such as previously passed Fig. 1 and Fig. 3, computing device can To refer to portable equipment or mobile device, such as mobile phone (including smart phone), wearable device (include intelligent handss Table), laptop computer etc..In some instances, computing device can be desk computer, tablet PC, intelligent television Platform, camera, personal digital assistant (PDA), server, main frame etc..
As UI equipment 12 as shown in Figure 1, there is sensitive display 134 can include display device 136 and exist Sensitizing input equipment 138.For example, display device 136 can receive the data from computing device 130 and show in figure Hold.In some instances, exist sensitizing input equipment 138 can use condenser type technology of identification, inductance type technology of identification and/ Or there are (for example, the continuous handss of one or more user input at sensitive display 134 to determine in optical recognition Gesture, multi-point touch gesture, single-point touch gesture etc.), and using communication channel 132A come by the instruction of such user input Send to computing device 130.In some instances, can there will be sensitizing input equipment 138 and be physically placed in display and set Standby 136 top so that when input block is placed in above the graphic element shown by display device 136 by user, exist quick The position that sense input equipment 138 is located is corresponding with the position of the display graphic element of display device 136.In other examples, Can there will be sensitizing input equipment 138 to be physically arranged as separating with display device 136, and there is sensitizing input equipment 138 position can be corresponding with the position of display device 136 so that input can be made at sensitizing input equipment 138 existing, To interact with the graphic element shown in the corresponding position of display device 136.
As shown in figure 4, computing device 130 can also include communication unit 140 and/or with the operatively coupling of communication unit 140 Close.Communication unit 140 can include the function of the communication unit 88 described in Fig. 3.The example of communication unit 140 can include network Interface card, Ethernet card, optical transceiver, RF transceiver or can send and/or receive information other any types Equipment.The other examples of such communication unit can include that Bluetooth, 3G and Wi-Fi radio, general serial are total Line (USB) interface etc..Computing device 130 may also include:For example, input equipment, outut device, memorizer, storage device etc. Individual or multiple miscellaneous equipments and/or one or more miscellaneous equipment is operatively coupled with this, for succinct and explanation mesh , one or more miscellaneous equipment is not shown in figure 3.
Fig. 4 also illustrates projector 150 and projection screen 152.Example as other of projector equipment can include electricity Sub- blank, holographic display device and any other suitable equipment for showing graphical content.Projector 150 and projection Screen 152 can include one or more communication unit, one or more communication unit enable relevant device with Computing device 130 communicates.In some instances, one or more communication unit can be realized in projector 5 and projection screen Communication between curtain 152.Projector 150 can receive the data including graphical content from computing device 130.In response to connecing The data are received, projector 150 can project to graphical content on projection screen 152.In some instances, projector 150 One or more user input (example at projection screen is determined using optical recognition or other suitable technologies Such as, continuous gesture, multi-point touch gesture, single-point touch gesture etc.), and using one or more communication unit come by so The instruction of user input send to computing device 130.In such an example, projection screen 152 is possibly unnecessary, and And graphical content can be projected on any suitable medium and be used projector 150 optical recognition or other this The suitable technology of sample is detecting one or more user input.
In some instances, projection screen 152 can include there is sensitive display 104.There is sensitive display 154 can It is functional with the subset of the function including UI equipment 12 and/or UI equipment 86 described by the disclosure or institute.In some examples In, there is sensitive display 134 can include additional function.Projection screen 152 (for example, electronic whiteboard) can be received from meter The data of calculation equipment 130 and show graphical content.In some instances, there is sensitizing input equipment 154 can be by using Condenser type technology of identification, inductance type technology of identification, and/or optical recognition are present at sensitive display 152 to determine One or more user input (for example, continuous gesture, multi-point touch gesture, single-point touch gesture etc.), and use one Or multiple communication units send the instruction of such user input to computing device 130.
Fig. 4 also illustrates mobile device 156 and visual display device 160.Mobile device 156 and visual display device 160 May each comprise calculating and concatenation ability.The example of mobile device 156 can include electronic reader devices, changeable type notebook Computer equipment, mixing plate-type device, wearable device etc..The example of visual display device 160 can include that other are semifixed Formula equipment, television set, computer monitor etc..As shown in figure 4, mobile device 156 can include there is sensitive display 158.Visual display device 160 can include there is sensitive display 162.There is sensitive display 158,162 can include this The subset of the function of open described UI equipment 12 and/or UI equipment 86 or institute are functional.In some instances, exist quick Sense display 158,162 can include additional function.Under any circumstance, for example, there is sensitive display 162 and can receive From the data of computing device 80 and show graphical content.In some instances, there is sensitizing input equipment 162 can be using electricity Appearance formula technology of identification, inductance type technology of identification, and/or optical recognition come determine at projection screen one or more User input (for example, continuous gesture, multi-point touch gesture, single-point touch gesture etc.), and using one or more communication Unit sends the instruction of such user input to computing device 130.
As described above, in some instances, computing device 130 can be with output pattern content in the sensitive display of presence Show at device 134, the sensitive display 134 passes through system bus or other suitable communication channels are coupled to computing device 130.Computing device 130 can be with output pattern content in such as projector 150, projection screen 152, mobile device Show at one or more remote equipment such as 156 and visual display device 160.For example, computing device 130 can be according to this public affairs The technology opened perform one or more instruction, to generate and/or change graphical content.Computing device 130 will can include The communication unit of the data output of graphical content to computing device 130, such as communication unit 140.Communication unit 140 can be by number According to sending to one or more in remote equipment, such as projector 150, projection screen 152, mobile device 156, and/or Visual display device 160.By this way, computing device 130 can be with output pattern content in remote equipment Show at one or more remote equipment.In some instances, one or more remote equipment in remote equipment can be with There is output pattern content at sensitive display, this exists during sensitive display is included in corresponding remote equipment and/or can It is operatively coupled to corresponding remote equipment.
In some instances, can not there is output pattern content at sensitive display 134 in computing device 130, and this is deposited Computing device 130 is operatively coupled in sensitive display 134.In other examples, computing device 130 can be with output pattern Hold for there is the display of both sensitive display 134 and one or more remote equipment place, the presence is sensitive to be shown Device 134 is coupled to computing device 130 by communication channel 132A.In such an example, can be in base at each relevant device This simultaneously shows graphical content.For example, may by the communication delay of the data is activation to remote equipment including graphical content Introduce some delays.In some instances, it is being generated by computing device 130 and export for there is sensitive display The graphical content shown at 134 can with output for the graphical content that shows at one or more remote equipment not Together.
Computing device 130 can send and receive data using any suitable communication technology.For example, computing device 130 can be operatively coupled to external network 144 using network linking 142A.It is each in remote equipment illustrated in Fig. 4 Individual remote equipment can be operatively coupled to outside network by corresponding network link 142B, 142C and 1422D Portion's network 144.External network 144 can be including the hub, the network switch, network router for operatively intercoupling Deng, thus information is provided between the computing device 130 and remote equipment shown in Fig. 4 exchange.In some instances, lattice chain Road 142A to 142D can be Ethernet, ATM or other network connections.Such connection can wirelessly be connected and/or have Line connects.
In some instances, computing device 130 can be operatively coupled to Fig. 4 bags using direct equipment communication 148 One or more remote equipment in the remote equipment for including.Directly equipment communication 148 can include using wire communication or The communication of radio communication, by the communication computing devices 130 directly using remote equipment sending and receiving data.That is, straight Connect in some examples of equipment communication 148, the data sent by computing device 130 its remote equipment by before receiving not Can be forwarded by one or more optional equipment, vice versa.Directly the example of equipment communication 138 can including Bluetooth, Near-field communication, USB (universal serial bus), Wi-Fi, infrared ray etc..One or more in remote equipment illustrated in Fig. 4 is long-range Equipment can be operatively coupled with computing device 130 by communication link 146A to 146D.In some instances, communication link 146A to 146D can be the connection using Bluetooth, near-field communication, USB (universal serial bus), infrared ray etc..Such connection Can be wireless connection and/or wired connection.
According to the technology of the disclosure, computing device 130 can be operably coupled to vision and be shown using external network 144 Show equipment 160.Computing device 130 can determine only user be currently viewing visual display device 160 and/or it is incoming communication not Including personal information, and as response, the figure for exporting incoming communication is indicated for show at sensitive display 162 existing Show.For example, computing device 130 can be by the data is activation of the expression indicated including figure to communication unit 140.Communication unit The data is activation of 140 expressions that will can be indicated including figure using external network 144 is to visual display device 160.Response In receiving data is carried out using external network 94, visual display device 160 can refer to so that there is 162 output pattern of sensitive display Show.
Fig. 5 be a diagram that the display of one or more technologies, the computing device management personal information according to the disclosure The flow chart of exemplary operations.The technology of Fig. 5 can be by computing device --- the computing device illustrated in such as Fig. 1, Fig. 3 and Fig. 4 10th, 80, and 130 one or more processor performing.For purposes of illustration, Fig. 1 computing system 1, Fig. 2 letter Breath server system 40, and Fig. 3 computing device 80 and 130 context under the technology of Fig. 5 is described, although having different configurations Computing device can perform the technology of Fig. 5.
According to one or more technologies of the disclosure, computing device 10A can receive the instruction (170) of incoming communication.Example Such as, incoming communication can be from the component of computing device 10A, external server (such as information server system 40) or calculating Another computing device in equipment 10 (such as computing device 10N) is received.The privacy module 24A of computing device 10A can be true Whether fixed incoming communication includes personal information (172).As discussed above, privacy module 24A can be based on such as one or more Content of individual predefined privacy settings, the sender of incoming communication and incoming communication etc., determines that the incoming communication includes private People's information.If it is incoming communication include personal information (172 "No" branches), computing device 10A can be configured to The instruction (178) of incoming communication is exported less.
In the incoming example for communicating and including personal information (172 "Yes" branches), privacy module 24A can determine other Whether individuality is close to computing device 10A (174).Presence detection module 22A can be received from one or more input equipment (such as camera, mike, there is sensitizing input equipment etc.), from motion sensor (such as accelerometer, gyroscope, compass Deng), from other types of sensor (such as sonac), from communication unit (such as Bluetooth, Wi-Fi, with Too net etc.), come comfortable computing device 10A place execution operating system and other softwares from computing device 10A and/or The information of hardware module.By using the information for receiving, presence detection module 22A can determine that one or more individuality is It is no to be close to computing device 10A (174).
Determine do not have other individualities to be close to computing device 10A (174 "No" branches) if there is detection module 22A, then Computing device 10A can be configured at least one instruction (178) for exporting incoming communication.It is true if there is detection module 22A Fixed other individualities are close to computing device 10A (174 "Yes" branches), then privacy module 24A can be based at least partially on calculating The type of equipment 10A is determining whether computing device shows personal information (176).Under some examples, privacy module 24A may be used also Currently whether looked into one or more individuality for being based at least partially on the user different from being associated with computing device 10A See that the display (for example, as determined by presence detection module 22A) of computing device 10A, the type of computing device 10A, user work as It is front whether to be currently in use computing device 10A, be based on --- the current location of computing device 10A is (such as in the working space of user Place), the application (such as demoware) of current active, being currently configured for computing device 10A (be for example connected to such as projector External display device) --- whether computing device 10A is currently being used in demonstration, and its any combinations, is determined Whether computing device 10A shows personal information.If computing device 10A is defeated with the equipment that the type is received with unique user Go out associated type, then privacy module 24A can determine that computing device 10A is currently designated as exporting personal information (176 "Yes" branch).If the type that output of computing device 10A with the equipment that the type is received with multiple users is associated, Privacy module 24A can determine that computing device 10A is currently not designated as exporting personal information (176 "No" branches).
In response to determining that computing device 10A is currently designated as showing personal information (176 "Yes" branches), computing device 10A at least exports the instruction (178) of incoming communication.In response to determining that computing device 10A is currently not designated as showing private letter Breath (176 "No" branches), in some instances, computing device 10A may determine whether and related to computing device 10A Associated other computing devices (180) of the same subscriber of connection, and in other examples, information server system 40 can determine With the presence or absence of and associated other computing devices (180) of the same subscriber that is associated with computing device 10A.Show at any one In example, if other computing devices are not associated with user, computing device at least forbids the instruction for exporting incoming communication (184)。
(180 "Yes" point in the case where there are other computing devices (such as computing device 10N) being associated with user ), the additional computing device (182) that computing device 10A and/or the identification of information server system 40 are associated with user.One In a little examples, information server system 40 determines whether recognized computing device (such as computing device 10N) is currently designated To show personal information (174).In some instances, the computing device for being recognized receives the instruction of incoming communication and determines which It is current whether to be designated as showing personal information (174).Generally, process is may proceed to until at least exporting incoming logical by computing device The instruction of letter or until being currently designated as showing personal information, the computing device that is associated with user it is determined that not existing.
A kind of 1. method of example, including:Incoming communication is received by computing device;In response to determining that the incoming communication includes Personal information, it is determined that whether one or more individualities different from the user pointed by the incoming communication are close to the calculating setting It is standby;One or more of individualities in response to determining different from the user pointed by the incoming communication are close to the meter Calculation equipment, by the computing device based on the type of the computing device come determine whether show personal information;In response to determining The personal information is shown, the instruction of the incoming communication is exported for showing by the computing device;And in response to determining The personal information is not shown, forbids the instruction of the incoming communication being exported for showing by the computing device.
Method of the example 2. according to example 1, wherein, by the class of the computing device based on the computing device Type come determine whether show personal information include:Based on a determination that the type of the computing device is wearable, mobile, individual One or more in people or individual, it is determined that showing personal information.
Method of the example 3. according to example 1, wherein, by the class of the computing device based on the computing device Type come determine whether show personal information include:Based on a determination that the type of the computing device is non-portable, public, knee joint Mo(u)ld top half, desktop or it is shared in one or more, it is determined that not showing personal information.
Method of the example 4. according to any one in example 1 to 3, wherein, the computing device is and user's phase First computing device of association, methods described are further included:In response to determining that the first computing device is currently not designated as showing Show personal information:It is determined that the second computing device being associated with user is currently designated as showing personal information;And by described First computing device provides the instruction of the described incoming communication to second computing device to second computing device.
Method of the example 5. according to any one in example 1 to 4, wherein it is determined that with pointed by the incoming communication Whether one or more different individualities of the user are close to the computing device includes:Ultrasound ping is exported by computing device; The echo of ultrasound ping is detected by computing device;And the echo is based on, determined and the incoming communication indication by computing device To different one or more individualities of user whether be close to the computing device.
Method of the example 6. according to any one in example 1 to 5, wherein it is determined that with pointed by the incoming communication Whether one or more different individualities of the user are close to the computing device includes:Wireless network is used by the computing device Network agreement is receiving the device identifier of mobile computing device;Based on the device identifier, institute is determined by the computing device State whether mobile computing device is associated with the user;And in response to determine the mobile computing device not with the user Associated, different one or more individualities of the user by pointed by the computing device determines from the incoming communication connect The nearly computing device.
Method of the example 7. according to example 6, wherein, during wireless network protocol is Bluetooth or Wi-Fi direct One or more.
Method of the example 8. according to any one in example 1 to 7, wherein it is determined that with pointed by the incoming communication Whether one or more different individualities of user are close to the computing device further includes:Audio frequency is captured by the computing device Data;Determine whether the voice data includes one or more voices, one or more of voices by the computing device It is associated with the individuality different from the user being associated with the computing device;In response to determining that the voice data includes described one Individual or multiple voices, determine that the computing device is currently not designated as showing personal information;And it is described in response to determining Voice data does not include one or more of voices, determines that the computing device is currently designated as showing personal information.
Method of the example 9. according to any one in example 1 to 8, wherein it is determined that with pointed by the incoming communication Whether one or more different individualities of user are close to the computing device includes:Caught during the time period by the computing device Obtain voice data;The instruction of the voice data is sent to remote computing system by the computing device;Set by the calculating It is standby to receive whether the voice data is caught by different computing devices from during the time period from the remote computing system The instruction that other voice datas for obtaining are associated;And based on the voice data whether from during the time period by different Computing device capture the associated instruction of other voice datas, it is determined that with the user pointed by the incoming communication not Whether same one or more of individualities are close to the computing device.
Method of the example 10. according to any one in example 1 to 9, determines whether the incoming communication includes private letter Breath includes:Included one or more objects in the view data of the incoming communication are recognized by the computing device;With And whether include personal information determining the incoming communication based on one or more of objects.
Method of the example 11. according to any one in example 1 to 10, wherein it is determined that whether incoming communication includes individual Information includes:Included one or more object in the view data of incoming communication is recognized by computing device;And base Determine that in one or more object the incoming communication includes personal information.
Method of the example 12. according to any one in example 1 to 11, wherein it is determined that whether the computing device is current Be designated as showing personal information be further based upon being close to one or more of individual identity of the computing device with The identity of the promoter of the incoming communication.
A kind of 13. first computing device of example, including one or more processors and at least one module, described at least one Individual module can by the one or more processors operate with:In response to determine it is incoming communication include personal information, it is determined that with it is described Whether one or more different individualities of user pointed by incoming communication are close to first computing device;In response to determine with The different one or more of individualities of the user pointed by the incoming communication are close to the computing device, based on described The type of the first computing device come determine whether show personal information;The personal information is shown in response to determining, output is described The instruction of incoming communication is for display;And in response to determining that first computing device is currently not designated as showing private letter Breath:It is determined that the second computing device being associated with the user is currently designated as showing personal information;And will be described incoming The instruction of communication is provided to second computing device.
First computing device of the example 14. according to example 13, wherein, at least one module can further by one The operation of individual or multiple processors with:Based on the type of computing device be one in wearable, mobile, personal or individual or Multiple determination, it is determined that showing personal information;And it is non-portable, public, on knee, table based on the type of computing device Face or it is shared in the determination of one or more, it is determined that not showing personal information.
First computing device of the example 15. according to any one in example 13 to 14, further includes sonac, The sonac exports ultrasound ping and detects the echo of ultrasonic ping, wherein, at least one module can be by one or many Individual processor operation determines that with based on the echo one or more different from the user pointed by the incoming communication are individual Whether the computing device is close to.
First computing device of the example 16. according to any one in example 13 to 15, further includes that wireless network connects Mouthful, the radio network interface receives the device identifier of mobile computing device using wireless network protocol, wherein, at least one Module can by one or more processors operate with:Based on device identifier, determine whether mobile computing device is related to user Connection, and in response to determining that the mobile computing device is not associated with user, it is determined that with the institute pointed by the incoming communication State one or more different individualities of user and be close to the computing device.
First computing device of the example 17. according to any one in example 13 to 16, further includes that audio input sets Standby, the audio input device captures voice data, wherein, at least one module can by one or more processors operate with:Really Whether the fixed voice data includes one or more voices, one or more of voice associations in different from the calculating The individuality of the associated user of equipment;In response to determining that the voice data includes one or more of voices, institute is determined State computing device to be currently not designated as showing personal information;And in response to determining that it is one that the voice data does not include Or multiple voices, determine that the computing device is currently designated as showing personal information.
First computing device of the example 18. according to any one in example 13 to 17, further includes:Audio input sets Standby, the audio input device captures voice data during the time period;And network interface, the network interface is by voice data Indicate to send to remote computing system, and from the remote computing system receive voice data whether with phase time period Between the associated instruction of other voice datas for being captured by different computing device, wherein, at least one module can by one or The operation of multiple processors with, based on the voice data whether from captured by different computing devices during the time period The associated instruction of other voice datas, it is determined that different from the user pointed by the incoming communication is one or many Whether individuality is close to the computing device.
First computing device of the example 19. according to any one in example 12 to 18, wherein, at least one module Can be operated by one or more processors with based on the sender of incoming communication, in the user being associated with computing device and described Relationship type, the content of incoming communication and included privacy mark in incoming communication between the sender of incoming communication One or more in will, determines whether the incoming communication includes personal information.
20. a kind of computing device of example, including the dress of the method for execution according to any one in example 1 to 12 Put.
A kind of 21. computer-readable recording medium of example, including instruction, the instruction is when executed by computing system One or more processors are configured to:In response to determine it is incoming communication include personal information, it is determined that with the incoming communication indication To different one or more individualities of user whether be close to the computing device;In response to determining and the incoming communication indication To the different one or more of individualities of the user be close to the computing device, the type based on the computing device come Determine whether to show personal information;The personal information is shown in response to determining, the instruction of the incoming communication is exported for aobvious Show;And personal information is not shown in response to determining, forbid exporting the instruction of incoming communication for showing.
A kind of 22. computer-readable recording medium of example, including instruction, the instruction cause computing device when executed One or more processors perform method according to any one in example 1 to 11.
Technology described by the disclosure can be realized with hardware, software, firmware or its combination at least in part.Example Such as, the various aspects of described technology can be realized with one or more processor, one or more processor Including one or more microprocessor, digital signal processor (DSP), special IC (ASIC), field programmable gate Array (FPGA) or any other equivalent integrated or discrete logic circuit, and any combinations of such component.Art Language " processor " or " process circuit " typically may refer to the aforementioned logic electricity for combining individually or with other logic circuits Any one in road or any other equivalent circuit system.The disclosure can also be performed including the control unit of hardware Technology in one or more.
Such hardware, software and firmware can be implemented in identical equipment or in single equipment, to prop up Hold each technology described by the disclosure.This text, any one in described unit, module or component can be together Or individually it is embodied as the logical device of separation but interoperable.Different characteristic is depicted as into module or unit is intended to emphasize not Same function aspects, and do not necessarily imply that such module or unit must be by detached hardware, firmware or software groups Part is realized.Conversely, the function associated with one or more module or unit can by detached hardware, firmware or Component software is performed, or is incorporated in public or detached hardware, firmware or component software.
Technology described by the disclosure can also be embodied as or encode including that the computer using instruction to encode can Read in the product of storage medium.Such as one or more computing device it is included in a computer-readable storage medium or During the instruction of person's coding, the instruction for being embedded into or encoding in the product including encoded computer-readable recording medium can So that one or more programmable processor or other processors realize or many in techniques described herein It is individual.Computer-readable recording medium can include random access memory (RAM), read only memory (ROM), may be programmed read-only depositing Reservoir (PROM), Erasable Programmable Read Only Memory EPROM (EPROM), Electrically Erasable Read Only Memory (EEPROM), sudden strain of a muscle Deposit, hard disk, CD ROM (CD-ROM), floppy disk, cassette tape, magnetic medium, optical medium or other computer-readables are situated between Matter.In some instances, product can include one or more computer-readable recording medium.
In some instances, computer-readable recording medium can include non-transitory medium.Term " non-transitory " can To indicate that storage medium is not presented as carrier wave or transmitting signal.In some examples, non-transitory storage medium can be deposited Storage can be with the data (for example, in RAM or caching) that the passage of time changes.
Have been described with each example of the present invention.These and other example is within the scope of the appended claims.

Claims (14)

1. a kind of method, including:
Incoming communication is received by computing device;
In response to determining that the incoming communication includes personal information:
Ultrasound ping is exported by the computing device;
The reflection of the ultrasonic ping is detected by the computing device;And
Based on the reflection, different one or more of user by pointed by the computing device determines from the incoming communication Whether individuality is close to the computing device;
In response to determining that one or more different from the user pointed by incoming communication individuality is close to the calculating Equipment, by the computing device based on the type of the computing device come determine whether show personal information;
The personal information is shown in response to determining, the instruction of the incoming communication is exported for showing by the computing device; And
The personal information is not shown in response to determining, forbids the instruction of the incoming communication is exported by the computing device For showing.
2. method according to claim 1, wherein, by the type of the computing device based on the computing device come Determine whether to show that personal information includes:Based on a determination that the type of the computing device be it is wearable, mobile, personal, or One or more in person individual, it is determined that showing personal information.
3. method according to claim 1, wherein, by the type of the computing device based on the computing device come Determine whether to show that personal information includes:Based on a determination that the type of the computing device is non-portable, public, above-knee Type, desktop or it is shared in one or more, it is determined that not showing personal information.
4. the method according to any one of claims 1 to 3, wherein, the computing device is related to the user First computing device of connection, methods described are further included:
In response to determining that first computing device is currently not designated as showing personal information:
It is determined that the second computing device being associated with the user is currently designated as showing personal information;And
The described incoming communication of second computing device is provided to second computing device from first computing device The instruction.
5. the method according to any one of Claims 1-4, wherein it is determined that with the institute pointed by the incoming communication State one or more different individualities of user and whether be close to the computing device and further include:
By the computing device using wireless network protocol receiving the device identifier of mobile computing device;
Based on the device identifier, determine whether the mobile computing device is related to the user by the computing device Connection;And
In response to determining that the mobile computing device is not associated with the user, determined by the computing device incoming with described One or more different individualities of the pointed user of communication are close to the computing device.
6. method according to claim 5, wherein, during the wireless network protocol is Bluetooth or Wi-Fi direct One or more.
7. the method according to any one of claim 1 to 6, wherein it is determined that with the use pointed by the incoming communication Whether one or more different individualities of family are close to the computing device further includes:
Voice data is captured by the computing device;
Determine whether the voice data includes one or more voices by the computing device, one or more of voices are closed It is coupled to the individuality different from the user being associated with the computing device;
In response to determining that the voice data includes one or more of voices, determine that the computing device is not currently referred to It is set to display personal information;And
In response to determining that the voice data does not include one or more of voices, determine that the computing device is currently referred to It is set to display personal information.
8. the method according to any one of claim 1 to 7, wherein it is determined that with the use pointed by the incoming communication Whether one or more different individualities of family are close to the computing device includes:
Voice data is captured by the computing device during a time period;
The instruction of the voice data is sent to remote computing system by the computing device;
By the computing device from the remote computing system receive the voice data whether with during the time period The instruction being associated by other voice datas that different computing devices is captured;And
Based on the voice data whether from other the audio frequency numbers captured by different computing devices during the time period According to associated instruction, it is determined that it is different from the user pointed by the incoming communication it is one or more of it is individual whether It is close to the computing device.
9. the method according to any one of claim 1 to 8, wherein it is determined that whether the incoming communication includes individual Information includes:
Included one or more object in the view data of the incoming communication is recognized by the computing device;And
Determine based on one or more of objects whether the incoming communication includes personal information.
10. the method according to any one of claim 1 to 9, wherein it is determined that whether the incoming communication includes individual Information is based on the sender of the incoming communication, in the user being associated with the computing device and the institute of the incoming communication State relationship type between sender, the content of the incoming communication and included privacy mark in the incoming communication One or more in will.
11. methods according to any one of claim 1 to 10, wherein it is determined that the computing device it is current whether by It is appointed as showing that personal information is further based upon being close to one or more of individual identity of the computing device and institute State the identity of the promoter of incoming communication.
A kind of 12. first computing devices, including:
One or more processors;And
At least one module, at least one module can by one or more of processors operate with:
In response to determine it is incoming communication include personal information, it is determined that one different from the user pointed by the incoming communication or Whether multiple individualities are close to first computing device;
In response to determining that one or more different from the user pointed by incoming communication individuality is close to described first Computing device, determines whether to show personal information based on the type of first computing device;
The personal information is shown in response to determining, the instruction of the incoming communication is exported for showing;And
In response to determining that first computing device is currently not designated as showing personal information:
It is determined that the second computing device being associated with the user is currently designated as showing personal information;And
The instruction of the described incoming communication to second computing device is provided to second computing device.
13. first computing devices according to claim 12, further include instruction, and the instruction is caused when executed The one or more processors of computing device perform the method according to any one of claim 1 to 11.
14. a kind of computer-readable recording mediums, including the side for execution according to any one of claim 1 to 12 The device of method.
CN201580044639.2A 2014-08-20 2015-08-10 Displaying private information on personal devices Pending CN106575344A (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201462039643P 2014-08-20 2014-08-20
US62/039,643 2014-08-20
US14/632,769 US20160057090A1 (en) 2014-08-20 2015-02-26 Displaying private information on personal devices
US14/632,769 2015-02-26
PCT/US2015/044535 WO2016028538A1 (en) 2014-08-20 2015-08-10 Displaying private information on personal devices

Publications (1)

Publication Number Publication Date
CN106575344A true CN106575344A (en) 2017-04-19

Family

ID=55349278

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580044639.2A Pending CN106575344A (en) 2014-08-20 2015-08-10 Displaying private information on personal devices

Country Status (4)

Country Link
US (1) US20160057090A1 (en)
EP (1) EP3183683B1 (en)
CN (1) CN106575344A (en)
WO (1) WO2016028538A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109151161A (en) * 2018-06-27 2019-01-04 Oppo广东移动通信有限公司 display control method and related product
CN109446770A (en) * 2018-10-18 2019-03-08 维沃移动通信有限公司 A kind of method and apparatus for protecting privacy
CN110285824A (en) * 2018-03-19 2019-09-27 本田技研工业株式会社 Information provider unit and its control method
CN110290046A (en) * 2018-03-19 2019-09-27 本田技研工业株式会社 Information provider unit and its control method
CN111163231A (en) * 2019-12-30 2020-05-15 广东盈世计算机科技有限公司 Message pushing method and device and user terminal
CN114667714A (en) * 2019-09-10 2022-06-24 康涅克斯康姆股份公司 Access control for private messages

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5991742B2 (en) * 2011-08-29 2016-09-14 キヤノン株式会社 Information processing apparatus, display state restoration method, and program
KR102063566B1 (en) 2014-02-23 2020-01-09 삼성전자주식회사 Operating Method For Text Message and Electronic Device supporting the same
CN105872685A (en) * 2016-03-24 2016-08-17 深圳市国华识别科技开发有限公司 Intelligent terminal control method and system, and intelligent terminal
CN107734213A (en) * 2016-08-11 2018-02-23 漳州立达信光电子科技有限公司 Intelligent domestic electronic installation and system
US10542423B1 (en) * 2016-12-22 2020-01-21 Wells Fargo Bank, N.A. Context-based presentation of information
CN107358117B (en) * 2017-06-30 2020-07-24 联想(北京)有限公司 Switching method, electronic equipment and computer storage medium
US10740635B2 (en) * 2017-09-28 2020-08-11 Google Llc Motion based account recognition
CN115981582B (en) * 2020-09-10 2024-05-14 华为技术有限公司 Display method and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000036493A1 (en) * 1998-12-18 2000-06-22 Tangis Corporation Method and system for controlling presentation of information to a user based on the user's condition
US20100205667A1 (en) * 2009-02-06 2010-08-12 Oculis Labs Video-Based Privacy Supporting System
US8539560B2 (en) * 2010-06-24 2013-09-17 International Business Machines Corporation Content protection using automatically selectable display surfaces
US20130304817A1 (en) * 2012-05-14 2013-11-14 Samsung Electronics Co., Ltd. Content delivery system with content sharing mechanism and method of operation thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8811951B1 (en) * 2014-01-07 2014-08-19 Google Inc. Managing display of private information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000036493A1 (en) * 1998-12-18 2000-06-22 Tangis Corporation Method and system for controlling presentation of information to a user based on the user's condition
US20100205667A1 (en) * 2009-02-06 2010-08-12 Oculis Labs Video-Based Privacy Supporting System
US8539560B2 (en) * 2010-06-24 2013-09-17 International Business Machines Corporation Content protection using automatically selectable display surfaces
US20130304817A1 (en) * 2012-05-14 2013-11-14 Samsung Electronics Co., Ltd. Content delivery system with content sharing mechanism and method of operation thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110285824A (en) * 2018-03-19 2019-09-27 本田技研工业株式会社 Information provider unit and its control method
CN110290046A (en) * 2018-03-19 2019-09-27 本田技研工业株式会社 Information provider unit and its control method
US10999713B2 (en) 2018-03-19 2021-05-04 Honda Motor Co., Ltd. Information providing apparatus for controlling output of information and control method thereof
CN109151161A (en) * 2018-06-27 2019-01-04 Oppo广东移动通信有限公司 display control method and related product
CN109446770A (en) * 2018-10-18 2019-03-08 维沃移动通信有限公司 A kind of method and apparatus for protecting privacy
CN114667714A (en) * 2019-09-10 2022-06-24 康涅克斯康姆股份公司 Access control for private messages
CN111163231A (en) * 2019-12-30 2020-05-15 广东盈世计算机科技有限公司 Message pushing method and device and user terminal

Also Published As

Publication number Publication date
WO2016028538A1 (en) 2016-02-25
US20160057090A1 (en) 2016-02-25
EP3183683B1 (en) 2019-10-30
EP3183683A1 (en) 2017-06-28

Similar Documents

Publication Publication Date Title
CN106575344A (en) Displaying private information on personal devices
CN105940411B (en) Privacy information is shown on personal device
US11763580B2 (en) Information processing apparatus, information processing method, and program
CN106030506B (en) Audio trigger based on context
CN105981035B (en) Manage the display of privacy information
CN105378624B (en) Interaction is shown when interaction comes across on blank
CN105745635B (en) The collaborative usertracking of context-aware
CN105960672B (en) Variable component deep neural network for Robust speech recognition
CN108093126A (en) For refusing the intelligent digital assistant of incoming call
CN110069127A (en) Based on the concern of user come adjustment information depth
CN106133646A (en) User's response to notice is determined based on physiological parameter
CN107493374A (en) Application integration with digital assistants
CN107106030A (en) The dynamic wearable device operating condition detected based on planning chart
CN106233312A (en) The auto-action replied based on context
CN103970441A (en) Method of performing function of device and device for performing the method
CN107544670A (en) The computing device of non-vision response with power triggering
CN108369672A (en) The guiding based on context is presented using electronic marker
CN104823433B (en) Infer in semantically integrating context
CN109643540A (en) System and method for artificial intelligent voice evolution
KR20160035753A (en) Method and apparatus for automatically creating message
US10244013B2 (en) Managing drop-ins on focal points of activities
CN110286836A (en) Equipment, method and graphic user interface for mobile application interface element
WO2020199742A1 (en) Smart phone
CN106031101A (en) Deriving atomic communication threads from independently addressable messages
US20240056444A1 (en) System and method for generating a connection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: American California

Applicant after: Google limited liability company

Address before: American California

Applicant before: Google Inc.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20170419

RJ01 Rejection of invention patent application after publication